Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

被引:92
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Naqvi, Husnain [1 ]
Shon, Taeshik [2 ]
Sher, Muhammad [1 ]
Farash, Mohammad Sabzinejad [3 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 443749, South Korea
[3] Kharazmi Univ, Mohammad Sabzinejad Farash Dept Math & Comp Sci, Tehran, Iran
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; TMIS; Body area networks; REMOTE USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; EXCHANGE PROTOCOL; EFFICIENT; SCHEME; SECURE; ANONYMITY; ROBUST;
D O I
10.1007/s10916-015-0244-0
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10): 135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1): 9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Cao, Tianjie
    Zhai, Jingxuan
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [32] Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Tianjie Cao
    Jingxuan Zhai
    Journal of Medical Systems, 2013, 37
  • [33] Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems
    Li, Chun-Ta
    Shih, Dong-Her
    Wang, Chun-Cheng
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 157 : 191 - 203
  • [34] Robust Anonymous Authentication Scheme for Telecare Medical Information Systems
    Qi Xie
    Jun Zhang
    Na Dong
    Journal of Medical Systems, 2013, 37
  • [35] A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
    Qi Jiang
    Jianfeng Ma
    Zhuo Ma
    Guangsong Li
    Journal of Medical Systems, 2013, 37
  • [36] Robust Anonymous Authentication Scheme for Telecare Medical Information Systems
    Xie, Qi
    Zhang, Jun
    Dong, Na
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [37] A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
    Jiang, Qi
    Ma, Jianfeng
    Ma, Zhuo
    Li, Guangsong
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (01)
  • [38] Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity
    Xiong, Hu
    Tao, Junyi
    Yuan, Chen
    IEEE ACCESS, 2017, 5 : 5648 - 5661
  • [39] Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
    Jiang, Qi
    Chen, Zhiren
    Li, Bingyan
    Shen, Jian
    Yang, Li
    Ma, Jianfeng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1061 - 1073
  • [40] Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
    Qi Jiang
    Zhiren Chen
    Bingyan Li
    Jian Shen
    Li Yang
    Jianfeng Ma
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1061 - 1073